This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29518/

Legislation establishing a Department of Homeland Security (DHS) (P.L. 107-296) included provisions for an information analysis element within the new department. It did not transfer to DHS existing government intelligence and law enforcement agencies but envisioned an analytical office utilizing the products of other agencies — both unevaluated information and finished reports — to provide warning of terrorist attacks, assessments of vulnerability, and recommendations for remedial actions at federal, state, and local levels, and by the private sector. In January 2003, the Administration announced its intention to establish a new Terrorist Threat Integration Center (TTIC) to undertake many of the tasks envisioned for the DHS informational analysis element, known as Information Analysis and Infrastructure Protection (IAIP), but some Members of Congress argue that TTIC cannot be a substitute for a DHS analytical effort. This report examines different approaches to improving the information analysis function and the sharing of information among federal agencies. digital.library.unt.edu/ark:/67531/metacrs10060/

This report discusses S. 113, a bill to extend the coverage of the Foreign Intelligence Surveillance Act ("FISA") to non-U.S. persons who engage in international terrorism or activities in preparation for terrorist acts, without a showing of membership in or affiliation with an international terrorist group. digital.library.unt.edu/ark:/67531/metadc824819/

During the latter half of 2004, disputes arose over whether or not to declassify portions of the sensitive content of reports resulting from congressional investigations and national commission inquiries into the terrorist attacks of September 11, 2001, the war in Iraq, and related matters. As a result, some called for Congress to create a special mechanism for the impartial and expeditious resolution of such disputes (S. 2672/H.R. 4855; S. 2845 amendment). This report discusses the culmination of one such effort at balancing legitimate competing needs for secrecy and openness. digital.library.unt.edu/ark:/67531/metadc821182/

This report discusses legislative initiatives to address the challenges facing the U.S. Intelligence Community in the 21st century. Growing concerns about transnational threats, especially terrorism, are leading to increasingly close cooperation between intelligence and law enforcement agencies. digital.library.unt.edu/ark:/67531/metadc820883/

This report discusses the 9/11 Commission's recommendation that the U.S. government shift the focus of its efforts to counter terrorist financing from a strategy based on seizing terrorist assets to a strategy based on exploiting intelligence gathered from financial investigations. digital.library.unt.edu/ark:/67531/metadc824603/

To address the challenges facing the U.S. Intelligence Community in the 21st Century, congressional and executive branch initiatives have sought to improve coordination among the different agencies and to encourage better analysis. This report examines various issues faced by the Intelligence Community and relevant policy in the 109th Congress. digital.library.unt.edu/ark:/67531/metacrs6401/

This report discusses the sunset of a handful of communications-related sections of the USA PATRIOT Act and the Intelligence Reform and Terrorism Prevention Act on March 10, 2006. The authority of the expiring sections remains in effect only as it relates to foreign intelligence investigations begun before sunset or to offenses or potential offenses begun or occurring before that date. Thereafter, the law reverts to its previous form unless it has been amended in the interim or subsequently renewed. digital.library.unt.edu/ark:/67531/metadc824614/

This report examines various provisions of the Patriot Act that were set to expire on December 31, 2005. Their expiration date has been postponed until March 10, 2006. The expiring sections deal with the power of federal authorities to conduct searches and seizures, generally searches and seizures relating to communications. digital.library.unt.edu/ark:/67531/metadc847608/

This report summarizes statutory authorities regarding access by the Government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices. digital.library.unt.edu/ark:/67531/metacrs9164/

Although the activities involved in homeland security intelligence (HSINT)
itself are not new, the relative importance of state, local, and private sector stakeholders; the awareness of how law enforcement information might protect national security; and the importance attached to homeland security intelligence have all increased substantially since the events of September 11, 2001. This report provides a potential conceptual model of how to frame HSINT, including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). While this community may not necessarily be a useful construct from a management perspective, it is nevertheless a community as traditionally defined. Although the HSIC’s members are diffused across the nation, they share a common counterterrorism interest. digital.library.unt.edu/ark:/67531/metacrs9515/

This report discusses the Foreign Intelligence Surveillance Act (FISA), the USA PATRIOT Act of 2001, and other related amendments that were included in the Intelligence Authorization Act for Fiscal Year 2002. digital.library.unt.edu/ark:/67531/metadc770540/

This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report, to be updated as events dictate, examines other actions and alternatives affecting congressional oversight in the field. digital.library.unt.edu/ark:/67531/metadc463221/

This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters. digital.library.unt.edu/ark:/67531/metadc700762/

This report provides an overview and review of legislative activity related to the Foreign Intelligence Surveillance Act (FISA). It also includes a detailed side-by-side comparison of the proposals to address FISA concerns: Senate Amendment to H.R. 3773 and the House Amendment to the Senate Amendment to H.R. 3773. digital.library.unt.edu/ark:/67531/metadc743350/

This report provides background on the development of intelligence satellites and identifies the roles various agencies play in their management and use. Issues surrounding the current policy and proposed changes are discussed, including the findings of an Independent Study Group (ISG) with respect to the increased sharing of satellite intelligence data. There follows a discussion of legal considerations, including whether satellite reconnaissance might constitute a "search" within the meaning of the Fourth Amendment; an overview of statutory authorities, as well as restrictions that might apply; and a brief description of executive branch authorities and Department of Defense directives that might apply. The report concludes by suggesting policy issues Congress may consider as it deliberates the potential advantages and pitfalls that may be encountered in expanding the role of satellite intelligence for homeland security purposes. digital.library.unt.edu/ark:/67531/metadc463237/

This report briefly outlines three issues relating to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions, in particular, are implicated in this debate — the Fourth and First Amendments. This report briefly examines these issues and sets them in context. digital.library.unt.edu/ark:/67531/metadc462237/

This report briefly outlines some of the perspectives reflected in the ongoing debate related to the Foreign Intelligence Surveillance Act (FISA) focusing on three issues: tension between national security and civil liberties, collection of foreign intelligence information from foreign persons, and limitations on liability for telecommunications providers furnishing aid to the government. digital.library.unt.edu/ark:/67531/metadc770527/

This report explores the various issues currently facing Congress in regards to intelligence and counterterrorism activities, including the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458), signed in December 2004; the position of Director of National Intelligence (DNI), which that act created; the importance of collaborative efforts between various intelligence agencies to successfully carry out counterterrorism measures; and other pieces of legislation relevant to such matters. digital.library.unt.edu/ark:/67531/metadc462342/

This report frames potential policy questions concerning the U.S. Secret Service's (USSS) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc462764/

This report first describes the current select committees on intelligence and then the former Joint Committee on Atomic Energy, often cited as a model for a counterpart on intelligence. The study also sets forth proposed characteristics for a joint committee on intelligence, differences among these, and their pros and cons. The report examines other actions and alternatives affecting congressional oversight in the field. digital.library.unt.edu/ark:/67531/metadc463049/

This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc501658/

The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc463207/

This report provides a potential conceptual model of how to frame homeland security intelligence (HSINT), including geographic, structural/statutory, and holistic approaches. Given that state, local, tribal, and private sector officials play such an important role in HSINT, the holistic model, one not constrained by geography or levels of government, strikes many as the most compelling. The report argues that there is, in effect, a Homeland Security Intelligence Community (HSIC). Although the HSIC's members are diffused across the nation, they share a common counterterrorism interest. The proliferation of intelligence and information fusion centers across the country indicate that state and local leaders believe there is value to centralizing intelligence gathering and analysis in a manner that assists them in preventing and responding to local manifestations of terrorist threats to their people, infrastructure, and other assets. At the policy and operational levels, the communication and integration of federal HSINT efforts with these state and local fusion centers will likely remain an important priority and future challenge. digital.library.unt.edu/ark:/67531/metadc462063/

This report examines the role of Congress as a consumer of national intelligence and examines several issues that Congress might address in the 111th Congress. digital.library.unt.edu/ark:/67531/metadc462929/

This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc501891/

This report summarizes legal authorities regarding access by the government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices. Where pertinent, it also discusses statutory prohibitions against accessing or disclosing such information, along with relevant exceptions to those prohibitions. digital.library.unt.edu/ark:/67531/metadc743583/

This report examines the statutory procedures governing covert action and associated questions to consider. Published reports have suggested that the Pentagon has expanded its counter-terrorism intelligence activities, and some observers have asserted that the Department of Defense (DOD) may have been conducting certain kinds of counterterrorism intelligence activities that would statutorily qualify as "covert actions," and thus require a presidential finding and the notification of the congressional intelligence committees. digital.library.unt.edu/ark:/67531/metadc743560/

This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities. digital.library.unt.edu/ark:/67531/metadc505526/

The Foreign Intelligence Surveillance Act (FISA) provides a statutory framework by which government agencies may, when gathering foreign intelligence investigation, obtain authorization to conduct electronic surveillance or physical searches, utilize pen registers and trap and trace devices, or access specified business records and other tangible things. This report discusses three sunsetting amendments of FISA which include the "Lone Wolf" provision, "roving" wiretaps, and access to business records. digital.library.unt.edu/ark:/67531/metadc462791/

This report to describe the statutory provisions that authorize the National Intelligence Council (NIC), provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight. digital.library.unt.edu/ark:/67531/metadc700905/

This report provides an overview of Department of Homeland Security Intelligence (DHSI) both at headquarters and within the components. It examines how DHSI is organized and supports key departmental activities to include homeland security analysis and threat warning; border security; critical infrastructure protection; and support to, and the sharing of information with, state, local, tribal, and private sector partners. It also discusses several oversight challenges and options that Congress may consider on certain issues. digital.library.unt.edu/ark:/67531/metadc700796/

This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29520/

This report reviews the history of Gang of Four notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc463326/

This report describes the statutory provision authorizing Gang of Eight notifications, reviews the legislative history of the provision, and examines the impact of such notifications on congressional oversight. digital.library.unt.edu/ark:/67531/metadc689273/

This report frames potential policy questions concerning the U.S. Secret Service's (USSS's) mission and organization through an examination of the USSS history and its statutory authorities, mission, and present activities within the Department of Homeland Security (DHS). digital.library.unt.edu/ark:/67531/metadc501792/

This report assesses the effects of the absence of intelligence authorization legislation since FY2005. Since FY2005, no annual intelligence authorization bill has been enacted. Although the National Security Act requires intelligence activities to be specifically authorized, this requirement has been satisfied in recent years by one-sentence catch-all provisions in defense appropriations acts authorizing intelligence activities. digital.library.unt.edu/ark:/67531/metadc505643/

The purpose of this report to describe the statutory provisions that authorize the National Intelligence Council (NIC), provide a brief history of its work, and review its role within the federal government. The report will focus on congressional interaction with the NIC and describe various options for modifying congressional oversight. digital.library.unt.edu/ark:/67531/metadc689155/

This report discusses the National Security Letters (NSLs), which seek customer and consumer transaction information in national security investigations from communications providers, financial institutions, and credit agencies. digital.library.unt.edu/ark:/67531/metadc689431/

This report discusses the efforts currently underway to improve coordination and encourage better analysis amongst the various agencies within the U.S. Intelligence Community, especially with regard to the ongoing and prominent issue of international terrorism. In particular, this report addresses the false intelligence regarding Iraqi weapons of mass destruction and the current efforts in Iraq and Iran in general. digital.library.unt.edu/ark:/67531/metadc689197/